Angela Zottarel
Angela Zottarel
PhD student, Aarhus University
Verified email at cs.au.dk - Homepage
Title
Cited by
Cited by
Year
MiniLEGO: Efficient secure two-party computation from general assumptions
TK Frederiksen, TP Jakobsen, JB Nielsen, PS Nordholt, C Orlandi
Annual International Conference on the Theory and Applications of …, 2013
882013
Signature schemes secure against hard-to-invert leakage
S Faust, C Hazay, JB Nielsen, PS Nordholt, A Zottarel
International Conference on the Theory and Application of Cryptology and …, 2012
362012
Leakage-resilient signatures with graceful degradation
JB Nielsen, D Venturi, A Zottarel
International Workshop on Public Key Cryptography, 362-379, 2014
182014
On the connection between leakage tolerance and adaptive security
JB Nielsen, D Venturi, A Zottarel
International Workshop on Public Key Cryptography, 497-515, 2013
112013
Signature schemes secure against hard-to-invert leakage
S Faust, C Hazay, JB Nielsen, PS Nordholt, A Zottarel
Journal of Cryptology 29 (2), 422-455, 2016
62016
Ddh-like assumptions based on extension rings
R Cramer, I Damgård, E Kiltz, S Zakarias, A Zottarel
International Workshop on Public Key Cryptography, 644-661, 2012
62012
Short paper on the generic hardness of DDH-II
I Damgård, C Hazay, A Zottarel
Manuscript, http://cs. au. dk/∼ angela/Hardness. pdf, 2014
32014
Server-Aided Two-Party Computation with Simultaneous Corruption
IC Pueyo, IB Damgård, S Ranellucci
Cryptology ePrint Archive, 2014
2014
Public key cryptography from weaker assumptions
A Zottarel
Institut for Datalogi, Aarhus Universitet, 2013
2013
Encryption from Weaker Assumptions
A Zottarel
2010
A Note on Generic Hardness of DDH-II
A Zottarel
The system can't perform the operation now. Try again later.
Articles 1–11